City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.102.213.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.102.213.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:16:42 CST 2025
;; MSG SIZE rcvd: 107
145.213.102.98.in-addr.arpa domain name pointer syn-098-102-213-145.biz.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.213.102.98.in-addr.arpa name = syn-098-102-213-145.biz.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.209.52.90 | attackbots | spam (f2b h2) |
2020-09-02 04:05:34 |
| 181.30.99.114 | attackbotsspam | Sep 1 22:27:46 localhost sshd[3966225]: Invalid user ali from 181.30.99.114 port 53796 ... |
2020-09-02 03:39:21 |
| 188.246.224.140 | attack | Sep 1 20:36:39 fhem-rasp sshd[28388]: Failed password for root from 188.246.224.140 port 44738 ssh2 Sep 1 20:36:41 fhem-rasp sshd[28388]: Disconnected from authenticating user root 188.246.224.140 port 44738 [preauth] ... |
2020-09-02 03:42:40 |
| 200.89.114.58 | attackbotsspam | 1598963244 - 09/01/2020 14:27:24 Host: 200.89.114.58/200.89.114.58 Port: 445 TCP Blocked |
2020-09-02 03:40:57 |
| 198.27.82.155 | attackspambots | Sep 1 16:31:06 pkdns2 sshd\[32094\]: Invalid user test1 from 198.27.82.155Sep 1 16:31:08 pkdns2 sshd\[32094\]: Failed password for invalid user test1 from 198.27.82.155 port 34700 ssh2Sep 1 16:34:44 pkdns2 sshd\[32192\]: Invalid user zy from 198.27.82.155Sep 1 16:34:45 pkdns2 sshd\[32192\]: Failed password for invalid user zy from 198.27.82.155 port 37579 ssh2Sep 1 16:38:22 pkdns2 sshd\[32371\]: Invalid user riana from 198.27.82.155Sep 1 16:38:25 pkdns2 sshd\[32371\]: Failed password for invalid user riana from 198.27.82.155 port 40503 ssh2 ... |
2020-09-02 03:40:06 |
| 61.164.109.3 | attackspambots | SSH Bruteforce |
2020-09-02 03:44:51 |
| 5.89.243.30 | attackbotsspam | Automatic report - Banned IP Access |
2020-09-02 03:57:03 |
| 111.231.54.212 | attack | Sep 1 07:00:18 dignus sshd[32373]: Failed password for invalid user al from 111.231.54.212 port 45720 ssh2 Sep 1 07:05:19 dignus sshd[610]: Invalid user linaro from 111.231.54.212 port 41084 Sep 1 07:05:19 dignus sshd[610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.54.212 Sep 1 07:05:21 dignus sshd[610]: Failed password for invalid user linaro from 111.231.54.212 port 41084 ssh2 Sep 1 07:10:18 dignus sshd[1407]: Invalid user ftp from 111.231.54.212 port 36450 ... |
2020-09-02 03:45:22 |
| 187.16.255.102 | attackspam |
|
2020-09-02 03:42:58 |
| 51.195.136.190 | attackbotsspam | SSH Brute-Force attacks |
2020-09-02 03:48:21 |
| 192.140.91.133 | attackbotsspam | Sep 1 13:27:48 shivevps sshd[28162]: Bad protocol version identification '\024' from 192.140.91.133 port 53831 ... |
2020-09-02 03:38:25 |
| 187.60.160.131 | attackbotsspam | Sep 1 13:27:51 shivevps sshd[28189]: Bad protocol version identification '\024' from 187.60.160.131 port 36873 ... |
2020-09-02 03:37:03 |
| 177.207.58.145 | attackspam | SMB Server BruteForce Attack |
2020-09-02 04:06:29 |
| 195.54.160.180 | attack | 2020-09-01T19:51:14.425111dmca.cloudsearch.cf sshd[1494]: Invalid user lindsay from 195.54.160.180 port 28544 2020-09-01T19:51:14.470256dmca.cloudsearch.cf sshd[1494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 2020-09-01T19:51:14.425111dmca.cloudsearch.cf sshd[1494]: Invalid user lindsay from 195.54.160.180 port 28544 2020-09-01T19:51:16.089144dmca.cloudsearch.cf sshd[1494]: Failed password for invalid user lindsay from 195.54.160.180 port 28544 ssh2 2020-09-01T19:51:16.444720dmca.cloudsearch.cf sshd[1496]: Invalid user PlcmSpIp from 195.54.160.180 port 34203 2020-09-01T19:51:16.489850dmca.cloudsearch.cf sshd[1496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 2020-09-01T19:51:16.444720dmca.cloudsearch.cf sshd[1496]: Invalid user PlcmSpIp from 195.54.160.180 port 34203 2020-09-01T19:51:18.384569dmca.cloudsearch.cf sshd[1496]: Failed password for invalid user PlcmSpIp f ... |
2020-09-02 03:55:34 |
| 119.45.42.58 | attackbots | Sep 1 12:26:22 vlre-nyc-1 sshd\[30396\]: Invalid user mfo from 119.45.42.58 Sep 1 12:26:22 vlre-nyc-1 sshd\[30396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.42.58 Sep 1 12:26:24 vlre-nyc-1 sshd\[30396\]: Failed password for invalid user mfo from 119.45.42.58 port 59344 ssh2 Sep 1 12:27:35 vlre-nyc-1 sshd\[30412\]: Invalid user testuser from 119.45.42.58 Sep 1 12:27:35 vlre-nyc-1 sshd\[30412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.42.58 ... |
2020-09-02 03:47:34 |